雅思阅读如何搞定判断题
雅思阅读判断题对于很多同学来说可谓又爱又恨,小编今天给大家带来了三段论,一起来学习吧,下面小编就和大家分享,来欣赏一下吧。
雅思阅读--三段论搞定判断题
今天我们在这里所说的三段落不是雅思写作里的三段论,而是逻辑学里的三段论,是演绎推理中的一种简单推理判断。它包含:一个一般性的原则(大前提),一个附属于前面大前提的特殊化陈述(小前提),以及由此引申出的特殊化陈述符合一般性原则的结论。
举个例子解释一下:
重庆人喜欢吃火锅(大前提),小张是重庆人(小前提),所以小张喜欢吃火锅(结论)。
当然三段论会有几种不同的呈现形式,刚才的例子只是其中一种肯定形式的推断,三段论里也含有否定推导,再举一个例子:
海洋哺乳动物不是鱼类(大前提),鲸是海洋哺乳动物(小前提),所以鲸不是鱼类(结论)。
这两个例子主要差异在于表达的肯定和否定上,还有一种推导的例子:小张不被允许去酒吧(前提一),十八岁以上的才被允许去酒吧(前提二),所以小张未满十八岁(结论)。
了解了三段论的基本形式后,我们要看看它对于我们解判断题有什么意义。我们都知道判断题里TRUE常见有两种呈现形式,一种是考点进行同义替换,一种是靠归纳总结出来。
既然需要归纳总结,说明在文中并没有一个句子直接告诉我们答案,而是多个句子的结合,这种归纳就要运用我们这里探讨的三段论了。下面我们来看几个比较经典的例子,看看三段论的运用。
雅思剑五第四套33题:Eastern hemlock is a fast-growing plant. 我们用eastern hemlock和fast-growing plant进行定位,发现了两个句子,一个位于最后一段的第三句:Shade-tolerant plants have lower photosynthetic rates and hence have lower growth rates than those of shade-intolerant species. (喜阴的植物比起喜阳的植物有着更低的光合作用率,因此有着更低的生长速度。)另一个则位于该段的倒数第二句:For example, eastern hemlock seedlings are shade-tolerant. (比如,东方毒芹的幼苗是喜阴的。)
这就是典型的大前提(喜阴植物生长速度慢)的小前提(东方毒芹是喜阴植物),因此我们就可以推出结论——东方毒芹生长速度慢。这与题目是相违背的,因此这道题应当判断为FALSE。我们再来看一个运用三段论进行推断的例子▼剑八第一套第24题:Class F airspace is airspace which is below 365m and not near airports. (F类别空间是在365米以下,而且不在机场附近。)我们用Class F和365米进行定位,分别在E段和G段读到这样的几个句子:In general, from 365m above the ground and higher, the entire country is blanketed by controlled airspace. In certain areas, mainly near airports, controlled airspace extends down to 215m above the ground, and, in the immediate vicinity of an airport, all the way down to the surface. (整体而已,从地面往上的365米以上或者更高,整个国家都是由受管控空间所覆盖。在特定地区,主要在机场附近,受管控区域延生到地面往上215米以上,而且在机场周边的话,一直延生到地面)。
G段里有这样的一个句子:Uncontrolled airspace is designated Class F, while controlled airspace below 5, 490m above sea level and not in the vicinity of an airport is Class E. (不受管控的空间被标为Class F……).
大家把这几句话连起来读,就会发现它们之间有一个衔接点:uncontrolled airspace和controlled airspace,两者正好是对立的,既然受管控的空间属于365米以上,机场附近是从215米往上,机场就从地面算起都是,那么不受管控的空间不就是365米往下,机场附近都不是,这样就是我们的24题所表达的意思了。
我们把这个逻辑稍微精简一下:甲管A范围(前提一),不属于甲的都是乙(前提二),所以乙管A范围外的(结论)。
三段论其实在我们的生活中是非常常见的,在雅思阅读的逻辑推论中运用虽然不多,但是并不是难点,不过要想运用熟练需要大家熟悉这个理论,相信大家多做练习必定能熟练掌握其运用。
雅思阅读高分秘籍--词汇+paraphrase
雅思阅读锦囊一:英语词库
所谓英语词库是英语对英语的词库而非是英语对汉语的词库。每个烤鸭都清楚雅思是国际性考试而非中国性质考试,单词背其中文意思在考试过程中是无效的,题目和文章都没有中文的出现。雅思阅读就是在全文中的找答案,可是你所用定位的词很多时候不会老老实实的坐在原文里等着你,这就需要你具备英语同义词的能力,比如剑桥6的67页的list of headings 的 key point 2 的首句中managers should ensure that all employees have specific goals and receive comments on how well they are doing in those goals. 与之相对应的答案是establish targets and give feedback 同意词组为:have specific goals等于establish targets,receive comments on how well they are doing in those goals等于give feedback。
雅思阅读锦囊二:ability to paraphrase
Paraphrase意思是用英文的句子或者段落来解释其英文的句子或者段落。对于外语系的孩子来讲这种能力的考试是家常便饭,也就造就了他们的理解能力比非外语系的同学们好很多。这种能力在雅思阅读考试中也是司空见惯的。例如:剑桥6的43页的判断题10. Cities with high level of bicycles usage can be efficient even when public transport is only averagely good. 很多孩子看见only习惯性判为NO。因为太绝对了。实则不然,答案为YES。对应于原文中two most ‘bicycle friend’ cities considered—Amsterdam and Copenhagen—were very efficient, even though their public transport systems were ‘ reasonable but special.
切记:高分的取得不只是靠技巧,雅思阅读能力的提升非常的重要。
雅思阅读全真练习系列:Hackers target the home front
Hackers target the home front
1. One of the UK's leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.
2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.
Growing threat
3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.
4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.
5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to ___s, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.
6. Once inside a bank's network, the hackers can communicate directly with computers holding account information and manipulate funds.
7. Has this actually happened? In some cases sources claim that the login details of ___s have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.
8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: "RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank."
9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.
10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.
11. "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors."
Increased vigilance
12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: "There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.
13. "This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office."
(667 words)
Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.
1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?
2. Which word is most likely to be used by hackers to describe home computers?
3. What do the majority of people in the UK prefer?
4. How do hackers collect information so as to compose emails?
5. What do hackers obtain illegally to gain access to banks’ computer network?
Questions 5-12 Complete the sentences below with words from the passage.
Use NO MORE THAN THREE WORDS for each answer.
6. The use of login details of ___s by criminals does not necessarily result in any ______________.
7. Royal Bank of Scotland claimed that they are not the only victim of ______________.
8. Corporate networks will be another target of hackers with improved _______________.
9. The attacks on individuals have been greatly increased within _______________.
10. With ________________, software used by criminals can eliminate its competing programs.
11. Home users are chosen as a target because they are considered as a __________ .
12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.